Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(2444)

Unified Diff: build/config/compiler/BUILD.gn

Issue 1326053003: port cfi to gn (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Disable CFI when targeting nacl Created 5 years, 3 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: build/config/compiler/BUILD.gn
diff --git a/build/config/compiler/BUILD.gn b/build/config/compiler/BUILD.gn
index e7af924c4dc5703a2ea49ce18f1444b829262161..a4c6604fab6a570330bbb75863fbe4584210db58 100644
--- a/build/config/compiler/BUILD.gn
+++ b/build/config/compiler/BUILD.gn
@@ -97,6 +97,7 @@ if (!is_win) {
# where stuff should go. Put warning related stuff in the "warnings" config.
config("compiler") {
+ arflags = []
cflags = []
cflags_c = []
cflags_cc = []
@@ -199,9 +200,9 @@ config("compiler") {
ldflags += [ "-Wl,--fatal-warnings" ]
}
- # Common options for AddressSanitizer, LeakSanitizer, ThreadSanitizer and
- # MemorySanitizer
- if (using_sanitizer) {
+ # Common options for AddressSanitizer, LeakSanitizer, ThreadSanitizer,
+ # MemorySanitizer and non-official CFI builds.
+ if (using_sanitizer || (is_cfi && !is_official_build)) {
cflags += [
"-fno-omit-frame-pointer",
"-gline-tables-only",
@@ -239,6 +240,56 @@ config("compiler") {
"-fsanitize-blacklist=$msan_blacklist_path",
]
}
+ if (is_cfi && !is_nacl) {
+ cfi_blacklist_path =
+ rebase_path("//tools/cfi/blacklist.txt", root_build_dir)
+ cflags += [
+ "-flto",
+ "-fsanitize=cfi-vcall",
+ "-fsanitize=cfi-derived-cast",
+ "-fsanitize=cfi-unrelated-cast",
+ "-fsanitize-blacklist=$cfi_blacklist_path",
+ ]
+ ldflags += [ "-flto" ]
+
+ gold_plugin_path = rebase_path(
+ "//third_party/llvm-build/Release+Asserts/lib/LLVMgold.so",
+ root_build_dir)
+ arflags += [
brettw 2015/09/03 04:41:20 My initial reaction is "I don't want this" but if
pcc1 2015/09/04 21:56:59 Archive files contain a symbol table for each obje
+ "--plugin",
+ gold_plugin_path,
+ ]
+
+ # Apply a lower LTO optimization level in non-official builds.
+ if (!is_official_build) {
+ if (is_linux) {
+ ldflags += [ "-Wl,-plugin-opt,O1" ]
+ } else if (is_mac) {
+ ldflags += [ "-Wl,-mllvm,-O1" ]
+ }
+ }
+
+ # Work-around for http://openradar.appspot.com/20356002
+ if (is_mac) {
+ ldflags += [ "-Wl,-all_load" ]
+ }
+
+ # Without this flag, LTO produces a .text section that is larger
+ # than the maximum call displacement, preventing the linker from
+ # relocating calls (http://llvm.org/PR22999).
+ if (current_cpu == "arm") {
+ ldflags += [ "-Wl,-plugin-opt,-function-sections" ]
+ }
+
+ if (use_cfi_diag) {
+ cflags += [
+ "-fno-sanitize-trap=cfi",
+ "-fsanitize-recover=cfi",
+ ]
+ } else {
+ defines += [ "CFI_ENFORCEMENT" ]
+ }
+ }
if (use_custom_libcxx) {
cflags_cc += [ "-nostdinc++" ]
@@ -466,7 +517,7 @@ config("compiler") {
"-Wl,-z,now",
"-Wl,-z,relro",
]
- if (!using_sanitizer) {
+ if (!using_sanitizer && !use_cfi_diag) {
ldflags += [ "-Wl,-z,defs" ]
}
}
@@ -1099,11 +1150,14 @@ config("rtti") {
}
}
config("no_rtti") {
- if (is_win) {
- cflags_cc = [ "/GR-" ]
- } else {
- cflags_cc = [ "-fno-rtti" ]
- cflags_objcc = cflags_cc
+ # CFI diagnostics require RTTI.
+ if (!use_cfi_diag) {
+ if (is_win) {
+ cflags_cc = [ "/GR-" ]
+ } else {
+ cflags_cc = [ "-fno-rtti" ]
+ cflags_objcc = cflags_cc
+ }
}
}

Powered by Google App Engine
This is Rietveld 408576698